Search Results - (( java application service algorithm ) OR ( strategy implementation using algorithm ))
Search alternatives:
- strategy implementation »
- implementation using »
- application service »
- service algorithm »
- java application »
- using algorithm »
-
1
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
5
Sequence-based interaction testing implementation using Bees Algorithm
Published 2023“…In this paper we present a sequence-based interaction testing strategy (termed as sequence covering array) using Bees Algorithm. …”
Conference paper -
6
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017Get full text
Get full text
Student Project -
7
Pairwise Test Data Generation based on Flower Pollination Algorithm
Published 2017“…Recently, many existing works are focusing on the use of Search-Based algorithms as the basis of the implementation algorithm; however, there is no single strategy that can be the best for all cases. …”
Get full text
Get full text
Get full text
Article -
8
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
Get full text
Get full text
Thesis -
9
Finding objects with segmentation strategy based multi robot exploration in unknown environment
Published 2013“…Also the algorithm using segmentation strategy is using frontier base algorithm for exploring divided area. …”
Get full text
Get full text
Get full text
Article -
10
An Automated Summarization Assessment Algorithm for Identifying Summarizing Strategies
Published 2016“…We then implemented the algorithm for the automated summarization assessment system that can be used to identify the summarizing strategies used by students in summary writing.…”
Get full text
Get full text
Article -
11
Comparative Analysis of Neighborhood based Meta-heuristic Algorithms for MC/DC Test Data Generation
Published 2016“…As a result, many meta-heuristic based strategy implementations have appeared in the literature. …”
Get full text
Get full text
Conference or Workshop Item -
12
Hybrid flower pollination algorithm strategies for t-way test suite generation
Published 2018“…Consequently, many useful meta-heuristic algorithms have been developed on the basis of the implementation of t-way strategies (where t indicates the interaction strength). …”
Get full text
Get full text
Get full text
Article -
13
-
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
An Effective Power Dispatch Strategy for Clustered Microgrids While Implementing Optimal Energy Management and Power Sharing Control Using Power Line Communication
Published 2020“…Thisarticle proposes an effective power dispatch strategy for clusteredmicrogrids. The developed hybrid algorithm implements optimalenergy management and power sharing control using binary data.The frequency-shift keying (FSK) technique has been adoptedfor transmitting the binary signal over the power line commu-nication (PLC). …”
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
19
An Efficient Parallel Quarter-sweep Point Iterative Algorithm for Solving Poisson Equation on SMP Parallel Computer
Published 2000“…In this paper, the parallel implementation of the new algorithm with the chessboard (CB) strategy on Symmetry Multi Processors (SMP) parallel computer was presented. …”
Get full text
Get full text
Article -
20
Parallel implementation on improved error signal of backpropagation algorithm
Published 2002“…Further study on the improved BP algorithm is carried out on many processors, which is implemented using the Sequent Symmetry SE30 machine. …”
Get full text
Get full text
Get full text
Article
